General
-
Target
17012025_0100_fifuc6.ps1
-
Size
182KB
-
Sample
250117-bgzzysxkfx
-
MD5
531f7522fa2f658d3695b8827ce1a651
-
SHA1
084d8a701f8f285b88abe292c2b4dbb202b23406
-
SHA256
f0924aa3814edd9834cb39707a1d9c217b6c99a2229b1c9264e4c7f72ef8ac66
-
SHA512
6d2977b3c85d710cad721ba4f2ac9256eb1ef4416975f17a7159d1c9adbac0d1eb6bddd0985b896711bef2846c58128379afb322c2f75388bef3cc405984779b
-
SSDEEP
3072:xQvNklrvsQRAvUnjuw1cYpQAO8PJ3lPZA9iR3TxUK/zGc5+n:GvGlAAnCwhHPplP2943Tz/zX5w
Static task
static1
Behavioral task
behavioral1
Sample
17012025_0100_fifuc6.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17012025_0100_fifuc6.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.cl-logistics.vn - Port:
587 - Username:
[email protected] - Password:
logistics@123
Targets
-
-
Target
17012025_0100_fifuc6.ps1
-
Size
182KB
-
MD5
531f7522fa2f658d3695b8827ce1a651
-
SHA1
084d8a701f8f285b88abe292c2b4dbb202b23406
-
SHA256
f0924aa3814edd9834cb39707a1d9c217b6c99a2229b1c9264e4c7f72ef8ac66
-
SHA512
6d2977b3c85d710cad721ba4f2ac9256eb1ef4416975f17a7159d1c9adbac0d1eb6bddd0985b896711bef2846c58128379afb322c2f75388bef3cc405984779b
-
SSDEEP
3072:xQvNklrvsQRAvUnjuw1cYpQAO8PJ3lPZA9iR3TxUK/zGc5+n:GvGlAAnCwhHPplP2943Tz/zX5w
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-